White Paper
Best Practices for Applying Visibility Technology to Inline and Out-of-Band Security
Date: 02/21/2020 Length: 5 Cost: $99.00

            Linked In    

Network visibility solutions are essential to security technologies that analyze network traffic. These solutions, including terminal access points (TAPs), bypass switches, and network packet brokers (NPBs), are foundational to ensuring that security solutions can reliably protect the enterprise without impacting service availability and performance. Typically, enterprises require two kinds of visibility technologies for security: one for inline appliance connectivity and another for mirroring traffic data to passive analysis tools. This paper explores how enterprises use network visibility technologies for both inline and out-of-band security use cases to support security solutions.

Shamus McGillicuddy


EMA Services

IT Professionals

EMA can help you:

  • Support your decisions
  • Succeed with key projects
  • Align IT with the business

Learn More!

IT Vendors

EMA can help you:

  • Build the right product
  • Reach the right prospects
  • Establish market credibility

Learn More!

EMA Advisory Notes Service

An Affordable Way to Stay on Top of Key Trends & Industry Events

Subscribe now

EMA Premium Research Service

In-Depth Insight into IT Management Benefits, Challenges & Best Practices in the Enterprise

Subscribe now

©1996-2020 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Subscribe to EMA RSS Feed